Secrecy And Privacy Quotes

We've searched our database for all the quotes and captions related to Secrecy And Privacy. Here they are! All 73 of them:

All human beings have three lives: public, private, and secret.
Gabriel García Márquez (Gabriel García Márquez: a Life)
Bene vixit, bene qui latuit." (To live well is to live concealed.)
Ovid (The Tristia of Ovid)
Privacy - like eating and breathing - is one of life's basic requirements.
Katherine Neville
In our culture privacy is often confused with secrecy. Open, honest, truth-telling individuals value privacy. We all need spaces where we can be alone with thoughts and feelings - where we can experience healthy psychological autonomy and can choose to share when we want to. Keeping secrets is usually about power, about hiding and concealing information.
bell hooks (All About Love: New Visions)
As people tend to ring-fence their privacy they become ever-more “incommunicado”, deliberately untouchable. By retreating in the secrecy of the safe haven of their living, their habitats become impregnable castles, with the draw-bridges of non-attendance always up. Adopting an attitude of "ghosting", constantly shamming ‘absence’, homes gradually become ghost houses and, extensively, communities grow into ghost towns. (“Could we leave the door unlocked?”)
Erik Pevernagie
While privacy strengthens all our bonds, secrecy weakens and damages connection. Lerner points out that we do not usually "know the emotional costs of keeping a secret" until the truth is disclosed. Usually, secrecy involves lying. And lying is always the setting for potential betrayal and violation of trust.
bell hooks (All About Love: New Visions)
Privacy is something that we maintain for the good of ourselves and others. Secrecy we keep to separate ourselves from others, even those we love.
Mary Alice Monroe
All violations of essential privacy are brutalizing.
Katharine Fullerton Gerould
And he judged of others by himself, not believing in what he saw, and always believing that every man had his real, most interesting life under the cover of secrecy and under the cover of night. All personal life rested on secrecy, and possibly it was partly on that account that civilised man was so nervously anxious that personal privacy should be respected.
Anton Chekhov (The Lady with the Little Dog)
Privacy seems not an illusion for those who want to believe in secrecy principle.
Toba Beta (My Ancestor Was an Ancient Astronaut)
You have to have an inside you, she used to say, and an outside you. Ain't nobody's business who you are really, so it's up to you what you gave them.
Colson Whitehead (Harlem Shuffle (Ray Carney, #1))
Secrets,” Kohler finally said, “are a luxury we can no longer afford.
Dan Brown (Angels & Demons (Robert Langdon, #1))
The world is not sliding, but galloping into a new transnational dystopia. This development has not been properly recognized outside of national security circles. It has been hidden by secrecy, complexity and scale. The internet, our greatest tool of emancipation, has been transformed into the most dangerous facilitator of totalitarianism we have ever seen. The internet is a threat to human civilization. These transformations have come about silently, because those who know what is going on work in the global surveillance industry and have no incentives to speak out. Left to its own trajectory, within a few years, global civilization will be a postmodern surveillance dystopia, from which escape for all but the most skilled individuals will be impossible. In fact, we may already be there. While many writers have considered what the internet means for global civilization, they are wrong. They are wrong because they do not have the sense of perspective that direct experience brings. They are wrong because they have never met the enemy.
Julian Assange (Cypherpunks: Freedom and the Future of the Internet)
It’s not the public opinion of what you are that matters, but the private personality of who you are!
Israelmore Ayivor (Leaders' Watchwords)
Confidentiality is a delicate bargain of trust.
Martin Uzochukwu Ugwu
Secrecy is strength, what people don't know they can't spoil.
Amit Kalantri (Wealth of Words)
My friendships are my privacy. My love life is my privacy. My health life is my privacy. My enemies are my privacy. My favourite is my privacy. My thinking is my privacy. If I show you what they're like then you're chosen.
Glad Munaiseche
Our fellowman either may voluntarily reveal to us the truth about himself, or by dissimulation he may deceive us as to the truth. No other object of knowledge can thus of its own initiative, either enlighten us with reference to itself or conceal itself, as a human being can. No other knowable object modifies its conduct from consideration of its being understood or misunderstood.
Georg Simmel (The Sociology of Secrecy and of Secret Societies)
One of my favorite words is a French word: sousveillance. It is the opposite of surveillance. Surveillance means to look from above; sousveillance means to look from below. In their dream of nation-states controlling all of our financial futures, they made one major miscalculation. It’s a hell of a lot harder for a few hundred thousand people to watch 7 1/2 billion. But what do you think happens when 7 1/2 billion of us stare back? When the panopticon turns around? When our financial systems, our communication systems, are private, and secrecy is an illusion that can’t be sustained? When crimes committed in the names of states and powerful corporations are vulnerable to hackers and whistleblowers and leakers? When everything eventually comes out? We have a great advantage because the natural balance of the system is one in which individuals can have privacy but the powerful cannot have secrecy anymore.
Andreas M. Antonopoulos (The Internet of Money)
Secrecy is paramount for the government and privacy is lost for the citizens during wars as well. Everyone is a suspect and liberty protections are ignored by the empire. The excuse is always that restricting liberty is required to make the people safe from enemies, seldom seen and identified but ever-present and demonized.
Ron Paul (Swords into Plowshares: A Life in Wartime and a Future of Peace and Prosperity)
It is acknowledged that father-daughter incest occurs on a large scale in the United States. Sexual abuse has now been included in child abuse legislation. A conservative estimate is that more than 1 million women have been sexually victimized by their fathers or other male relatives, but the true figure probably is much higher. Many victims still fear reporting incest, and families continued to collude to keep the situation secret. Issues of family privacy and autonomy remain troublesome even when incest is reported and must be resolved for treatment to be effective. " Mary de Chesnay J. Psychosoc. Nurs. Med. Health Sep. 22:9-16 Sept 1984 reprinted in Talbott's 1986 edition
John A. Talbott (Year Book of Psychiatry and Applied Mental Health (Volume 2008) (Year Books, Volume 2008))
In our culture privacy is often confused with secrecy.
bell hooks
To refuse to claim your privacy is actually to cede it, either to state trespassing its constitutional restraints or to a "private" business.
Edward Snowden (Permanent Record)
privacy shifts into secrecy when an act of deliberate concealment or hiding has a significant impact on a relationship process
Harriet Lerner (The Dance of Deception: A Guide to Authenticity and Truth-Telling in Women's Relationships)
All personal life rested on secrecy, and possibly it was partly on that account that civilised man was so nervously anxious that personal privacy should be respected.
Anton Chekhov (The Lady with the Dog and Other Stories)
What wild undisturbed corners do you leave within you or within your partner, your children, your parents, your closest friends? What is left respectfully and quietly for passive cultivation, for privacy, for the imagination, for discovery, for serendipity, for faith, for secrecy, for grace, for reverence, for the untapped, for the future, for the unknowable and the unknown?
Kathryn Hall (Plant Whatever Brings You Joy: Blessed Wisdom from the Garden)
The desire for privacy and intimacy war inside of me, these contradictory hopes for secrecy and connection. I don't want him to know, but I want him to understand. I want to hide. I want to be seen.
Riley Redgate (Alone Out Here)
Everything happens at night. The world changes, the shadows grow, there's secrecy and privacy in dark places. First kiss at night, by the monkey bars and the old swings that the children and their parents have vacated; second, longer kiss, by the bike stands, swirl of dust around feet in the dry summer air. Awkward words, like secrets just waiting to be broken, the struggle to find the right ones, the heady fear of exposure --- what if, what if --- the joy when the words are returned. Love, in the parkette, while the moon waxes and the clouds pass. Promises at night. Not first promises --- those are so old they can't be remembered --- but new promises, sharp and biting; they almost hurt to say, but it's a good hurt. Dreams at night, before sleep, and dreams during sleep. Everything, always, happens at night.
Michelle Sagara (Silence (The Queen of the Dead, #1))
Ah, but thinking became morbid, sentimental, directly one began conjuring up doctors, dead bodies; a little glow of pleasure, a sort of lust, too, over the visual impression warned one not to go on with that sort of thing any more - fatal to art, fatal to friendship. True. And yet, thought Peter Walsh, as the ambulance turned the corner, though the light high bell could be heard down the next street and still farther as it crossed the Tottenham Court Road, chiming constantly, it is the privilege of loneliness; in privacy one may do as one chooses. One might weep if no one saw. It had been his undoing - this susceptibility - in Anglo-Indian society; not weeping at the right time, or laughing either. I have that in me, he thought, standing by the pillar box, which could now dissolve in tears. Why heaven knows. Beauty of some sort probably, and the weight of the day, which, beginning with that visit to Clarissa, had exhausted him with its heat, its intensity, and the drip, drip of one impression after another down into that cellar where they stood, deep, dark, and no one would ever know. Partly for that reason, its secrecy, complete and inviolable, he had found life like an unknown garden, full of turns and corners, surprising, yes; really it took one's breath away, these moments; there coming to him by the pillar-box opposite the British Museum one of them, a moment, in which things came together; this ambulance; and life and death.
Virginia Woolf (Mrs. Dalloway)
You know what the best course I ever took at college was? Biology. We studied evolution. And I learned something important.’ Now he included Leonard in his gaze. ‘It helped me choose my career. For thousands, no, millions of years we had these huge brains, the neo-cortex, right? But we didn’t speak to each other, and we lived like fucking pigs. There was nothing. No language, no culture, nothing. And then, suddenly, wham! It was there. Suddenly it was something we had to have, and there was no turning back. So why did it suddenly happen?’ Russell shrugged. ‘Hand of God?’ ‘Hand of God my ass. I’ll tell you why. Back then we all used to hang out together all day long doing the same thing. We lived in packs. So there was no need for language. If there was a leopard coming, there was no point saying, Hey man, what’s coming down the track? A leopard! Everyone could see it, everyone was jumping up and down and screaming, trying to scare it off. But what happens when someone goes off on his own for a moment’s privacy? When he sees a leopard coming, he knows something the others don’t. And he knows they don’t know. He has something they don’t, he has a secret, and this is the beginning of his individuality, of his consciousness. If he wants to share his secret and run down the track to warn the other guys, then he’s going to need to invent language. From there grows the possibility of culture. Or he can hang back and hope the leopard will take out the leadership that’s been giving him a hard time. A secret plan, that means more individuation, more consciousness.’ The band was starting to play a fast, loud number. Glass had to shout his conclusion, ‘Secrecy made us possible,’ and Russell raised his beer to salute the theory.
Ian McEwan (The Innocent)
Sometimes I speak to various regional banks, the ones that are not afraid of bitcoin. They tell me things like 80 percent of our population is a hundred miles from the nearest bank branch and we can’t serve them. In one case, they said a hundred miles by canoe. I’ll let you guess which country that was. Yet, even in the remotest places on Earth, now there is a cell-phone tower. Even in the poorest places on Earth, we often see a little solar panel on a little hut that feeds a Nokia 1000 phone, the most produced device in the history of manufacturing, billions of them have shipped. We can turn every one of those into, not a bank account, but a bank. Two weeks ago, President Obama at South by Southwest did a presentation and he talked about our privacy. He said, ”If we can’t unlock the phones, that means that everyone has a Swiss bank account in their pocket." That is not entirely accurate. I don’t have a Swiss bank account in my pocket. I have a Swiss bank, with the ability to generate 2 billion addresses off a single seed and use a different address for every transaction. That bank is completely encrypted, so even if you do unlock the phone, I still have access to my bank. That represents the cognitive dissonance between the powers of centralized secrecy and the power of privacy as a human right that we now have within our grasp. If you think this is going to be easy or that it’s going to be without struggle, you’re very mistaken.
Andreas M. Antonopoulos (The Internet of Money)
Zimmermann believed that everybody deserved the right to the privacy that was offered by RSA encryption, and he directed his political zeal toward developing an RSA encryption product for the masses.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
quantum cryptography is a system that ensures the security of a message by making it hard for Eve to read accurately a communication between Alice and Bob. Furthermore, if Eve tries to eavesdrop then Alice and Bob will be able to detect her presence. Quantum cryptography therefore allows Alice and Bob to exchange and agree upon a onetime pad in complete privacy, and thereafter they can use this as a key to encrypt a message.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
In our culture privacy is often confused with secrecy
bell hooks
Obama was apparently relying, at least in part, on intelligence disclosed more than a year earlier by a senior CIA official who, according to the Wall Street Journal, “told a meeting of utility company representatives in New Orleans that a cyberattack had taken out power equipment in multiple regions outside the U.S.”47 Later that year, CBS News identified one of the countries involved as Brazil, which reportedly suffered a series of attacks, one of which “affected more than three million people in dozens of cities over a two-day period” and knocked the world’s largest iron ore producer off-line, costing that company alone $7 million. The utility’s later assertion that the blackouts were caused by routine maintenance failures are difficult to credit.
Joel Brenner (Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World)
The lecturer’s name was Dr. Shen Weiguang, and although he’s now regarded as the founding sage of Chinese information warfare theory, his views were then on the fringe in strategic circles in the Middle Kingdom. “Virus-infected microchips can be put in weapon systems,” he pointed out. “An arms manufacturer can be asked to write a virus into software, or a biological weapon can be embedded into the computer system of an enemy nation and then activated as needed. . . . Preparation for a military invasion can include hiding self-destructing microchips in systems designed for export.” Tactics like these, he said, could have profound strategic implications if carried out carefully and systematically. They could “destroy the enemy’s political, economic, and military information infrastructures, and, perhaps, even the information infrastructure for all of society.” If China could do that, Shen said, it could achieve the greatest of all strategic military objectives: It could “destroy the enemy’s will to launch a war or wage a war.
Joel Brenner (Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World)
Information dominance remains a bedrock principle in both U.S. and Chinese war-fighting doctrine, essential to establishing naval and air superiority.17 In Kosovo, however, the Chinese saw the issue through the other end of the telescope. By corrupting NATO’s information flow, the Serbs had significantly reduced the importance of air superiority. Here was an example in information space of a venerable concept in Chinese strategic thought: the defeat of the superior by the inferior. But the Chinese were not interested in partial success and canvas decoys. They saw bigger possibilities.
Joel Brenner (Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World)
If the First Gulf War made PLA military planners pay close attention to American battle prowess, the appearance in Beijing in 1999 of a volume called Unrestricted Warfare returned the favor. This book gave Pentagon strategists an alarming window into Chinese thinking about the nature of their engagement with the Western world, particularly the United States. The authors were two senior PLA colonels from China’s rising military elite, Qiao Liang and Wang Xiangsui, whose work obviously had official sanction.19 Qiao and Wang argued that China should use all means, armed and unarmed, military and nonmilitary, and lethal and nonlethal, to compel the enemy to accept its interests.
Joel Brenner (Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World)
And while von Clausewitz had preached the doctrine of the decisive battle, Qiao and Wang said there would be no more decisive battles. Henceforth, they said (paraphrasing Eliot), when empires perished they would crumble like the Soviet Union, “not with a rumble, but a snicker.
Joel Brenner (Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World)
The agents of imperial demise would certainly be backed up by military power—the Chinese have never wavered in that view—but the agents would be many and varied: economic, legal, public relations—and electronic sabotage. The success of George Soros’s then recent speculative attack on the currencies of several East Asian nations impressed but appalled the Chinese (who have pegged their own currency to the dollar in part to discourage such tactics). Soros and his traders had driven down the value of these currencies, forcing them into line with their true worth! But that point was lost on Qiao and Wang, as it was lost on noncapitalists (i.e., most people) around the world, who saw only economic chaos in Asia created by Western capitalists. To the authors of Unrestricted Warfare, these attacks were a form of economic terrorism on par with bin Laden’s bombings of U.S. embassies in East Africa, Aum Shinrikyo’s sarin gas attack in the Tokyo subway, and the depredations of malicious hackers on the Internet. They “represent semi-warfare, quasi-warfare, and sub-warfare, that is, the embryonic form of another kind of warfare.” Such warfare knows no boundaries, and against it, borders have no meaning.
Joel Brenner (Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World)
In the law and culture of the West, war and peace are an on-off toggle switch. Peace is what you have when you don’t have war, and wars are declared.
Joel Brenner (Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World)
The Chinese are forcing Mao’s PLA into the twenty-first century as fast as they can, and have launched the most ambitious naval modernization program since the PRC was founded in 1949.38 Yet the principle of the “people’s war” remains a pillar of military doctrine as well as national mythology, and they have not abandoned it.39
Joel Brenner (Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World)
Between these amorphous hacker groups and the PLA’s network professionals lies a murky middle layer whose shape, not surprisingly, is indistinct, but whose mission—information warfare (IW)—is not. In 1998 the PRC launched what may have been its first experiment with a cybermilitia: a forty-person unit in a state-owned enterprise in Datong City, Shanxi Province, which had a rich talent pool drawn from some twenty universities, institutes, and companies.48 Militias are neither official government cadres nor freelance hackers. They operate in ambiguous space, connected to one or another government office by a loose string. A twitch of a government finger tightens the string, either to restrain or direct an operation. The PLA has been actively creating IW militias since about 2002, recruiting from universities, research institutes, and commercial IT companies, especially telecom firms. Some accounts call these cadres an “active reserve,” comprising eight million network operators under direct state control.
Joel Brenner (Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World)
also pointed out the asymmetric advantage that nonstate actors would have, because a nation-state “adheres to certain rules and will only use limited force to obtain a limited goal,” whereas terrorists (artistic or otherwise) “never observe any rules and . . . are not afraid to fight an unlimited war using unlimited means.”18
Joel Brenner (Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World)
Privacy in adoption is, I think, a different matter. People need to have boundaries. They need to use discretion in what they talk about and with whom they talk. Secrecy is when things about you are kept from you. Privacy is when you choose to whom you want to tell things about yourself.
Joyce Maguire Pavao (The Family of Adoption: Completely Revised and Updated)
If you are having private thoughts and ask an intimate friend to listen to them in privacy or on a date will that be considered too intimi-dating? And if the thoughts are proved to be untrue, but your friend still insists on believing in them anyway, would that be considered a cons-piracy?
Ana Claudia Antunes (One Hundred One World Accounts in One Hundred One Word Count)
On a Monday evening in March in a “room full of political reporters,” Mrs. Clinton said: “I am all about new beginnings.… So here goes, no more secrecy, no more zone of privacy.” Just four days later, Clinton’s attorney informed Congress that she had deleted all emails on a private server that she used for both personal and official State Department communications while serving as secretary of state, having delivered to the State Department only those that she deemed sufficiently work-related to turn over.
Anonymous
At this time, Snowden, a thirty-one-year-old man without a country, remains in Russia under temporary asylum, recently joined by his girlfriend, regularly interviewed by visiting reporters, and broadcasting his story and viewpoints to audiences worldwide over the Internet. His residence permit recently was extended for three more years, as he negotiates safe harbor in other countries, evading extradition and facing an indictment in the United States for espionage and theft of government property for which he faces thirty years in prison. Reviled for recklessness and praised for self-sacrifice, his actions already have generated the beginnings of reforms.
Ronald Goldfarb (After Snowden: Privacy, Secrecy, and Security in the Information Age)
The Snowden affair raises a classic, fundamental question about how our three branches of government should synchronize their work, yet check and balance each other’s powers.
Ronald Goldfarb (After Snowden: Privacy, Secrecy, and Security in the Information Age)
Some people mistake privacy for secrecy and fill in the blanks with nonsense
Riley Sager (Lock Every Door)
privacy (spaces in people’s psyches that everyone needs in healthy relationships) and secrecy (which stems from shame and tends to be corrosive). Carl Jung called secrets
Lori Gottlieb (Maybe You Should Talk to Someone: A Therapist, Her Therapist, and Our Lives Revealed)
There’s a big difference between privacy and secrecy. Privacy is voluntary. Secrecy isn’t.
Amy Morin (13 Things Mentally Strong Women Don't Do: Own Your Power, Channel Your Confidence, and Find Your Authentic Voice for a Life of Meaning and Joy)
Armies, like families, are institutions that create a world. Both successfully engender the new member's respect, loyalty, love, affirmation, gratitude, and obedience. I speak of armies and families as creating social power, because the hold that each of these institutions has over its members comes to greatly exceed its moment-to-moment capacity to reward or punish and usually persists long after significant practical affiliation has ended. The following features are common to both of these world-making institutions, whether the new member experiences them as benign or malevolent: Barriers to escape Control of body and bodily functions What and when to eath When, where, and how much to sleep Body form (clothing, weight, haircut) When and where to urinate and defecate Lack of privacy regarding bodily functions Prolonged daily contact with power-holder in group Power-holder as source of small rewards, comfort, approval Inconsistent, unpredictable, capricious enforcement of rules Monopolization of communication, resources, control Secrecy regarding some activities and events Lack of alternative to seeing world through power-holder's eyes Required repetition of buzz words, songs, slogans, cliches, even if inwardly disbelieved and rejected
Jonathan Shay
Data activism is simply human rights. Information is power. It is secrecy that maintains power at the top and violation of privacy that depletes it at the bottom. The right to define reality is the right which creates all power.
Heather Marsh (The Creation of Me, Them and Us)
The shadowy masters of industrial data mining eviscerate personal privacy from behind a veil of corporate secrecy. We’ll see this dynamic repeatedly: corporate secrecy expands as the privacy of human beings contracts.
Frank Pasquale (The Black Box Society: The Secret Algorithms That Control Money and Information)
Distinguish between privacy and secrecy.
Harriet Lerner (The Dance of Anger: A Woman's Guide to Changing the Patterns of Intimate Relationships)
What wasn't disclosed is not equal to a lie, Privacy is not the substance of secrecy.
Goitsemang Mvula
One view is that privacy consists of ‘limited accessibility’ – a cluster of three related but independent components: secrecy: information known about an individual; anonymity: attention paid to an individual; and solitude: physical access to an individual.
Raymond Wacks (Privacy: A Very Short Introduction (Very Short Introductions))
Often, when information is withheld by women and men, protection of privacy is the justification. In our culture privacy is often confused with secrecy. Open, honest, truth-telling individuals value privacy. We all need spaces where we can be alone with thoughts and feelings—where we can experience healthy psychological autonomy and can choose to share when we want to. Keeping secrets is usually about power, about hiding and concealing information.
bell hooks (All About Love: New Visions)
Learn from history, maintain your mystery, take your victory.
Amit Kalantri (Wealth of Words)
There is difference between privacy and secrecy, you should privately tell your partner all your secrets.
Amit Kalantri (Wealth of Words)
The internal Censor (and maddening companions); the necessity for privacy; the security of secrecy. To control these three fears is to unlock the secret of how to slip under the surface of the conscious mind where connections and freedom flourish.
Alexandra Johnson (Leaving a Trace: On Keeping a Journal)
Separate bedrooms? Never again!
Steven Magee
In couples therapy, therapists talk about the difference between privacy (spaces in people’s psyches that everyone needs in healthy relationships) and secrecy (which stems from shame and tends to be corrosive). Carl Jung called secrets “psychic poison,
Lori Gottlieb (Maybe You Should Talk to Someone: A Therapist, Her Therapist, and Our Lives Revealed)
Suffering, like desire, turns privacy into secrecy. From a psycho-analytic point of view a symptom is a (secret) way of asking for something (forbidden).
Adam Phillips (Terrors and Experts)
The truth was that they enjoyed deceiving their parents. The secrecy was not merely necessary, it was fun. It injected a frission of the illicit and gave them a shared psychic space in a society where privacy didn't exist. It was a relatively safe way to rebel against the confines of their lives.
Barbara Demick (Nothing to Envy: Ordinary Lives in North Korea)
I don’t tell my friends about her. There’s a precious quality in good things that is lost when you explain them at parties. I try not to. One because telling people what you love is like stapling them to a paper you read every day. I don’t want them on it. And two, if you do discuss it and they react without a care, you feel like they took something from you. But there is also the other reason I keep my mouth shut, which is that there is a sweetness to not knowing other folks’ reactions about what only you love. Secrecy is the only way you can know you love it. So I hide her with me, like a treasure chest in an ocean full of partying pirates: deep-down and with a spell.
Kristian Ventura (The Goodbye Song)
the development of a fully operational quantum computer would imperil our personal privacy, destroy electronic commerce and demolish the concept of national security. A quantum computer would jeopardize the stability of the world.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
Ever since Obamacare was signed into law in 2010 it has distorted American health care, raised insurance costs, and hurt the economy. It has also been implemented with shameless disregard for the law (having been unilaterally changed by President Obama without the permission of Congress at least twenty-eight times) and with almost no transparency. We at Judicial Watch started The National Obama Accountability Project to hold Barack Obama and his administration accountable to the American people for its compulsive secrecy and violations of the law. Since then, we have initiated more than 950 open record requests and filed more than 90 lawsuits to protect the people’s right to know about what the Obama administration is up to. Two areas we have focused on are the complete failure of the Obama administration to protect the privacy of your health records and its connivance with Congress to evade the consequences of the Obamacare law and allow its members and staff to receive subsidies under the law that aren’t available to millions of taxpayers. In
Tom Fitton (Clean House: Exposing Our Government's Secrets and Lies)
But the importance of privacy is evident in the fact that even those who devalue it, who have declared it dead or dispensable, do not believe the things they say. Anti-privacy advocates have often gone to great lengths to maintain control over the visibility of their own behavior and information. The US government itself has used extreme measures to shield its actions from public view, erecting an ever-higher wall of secrecy behind which it operates. As a 2011 report from the ACLU argued, “Today much of our government’s business is conducted in secret.” So secretive is this shadowy world, “so large, so unwieldy,” as the Washington Post reported, that no one knows how much money it costs, how many people it employs, how many programs exist within it or exactly how many agencies do the same work.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Privacy is something that we maintain for the good of ourselves and others. Secrecy we keep to separate ourselves from others, even those we love.
Mary Alice Monroe (The Beach House)
Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know.
Eric Hughes (A Cypherpunk Manifesto)
The concept of online privacy goes beyond mere secrecy; it's a declaration of our right to control the narrative of our digital lives. As we navigate the vast expanse of the internet, it becomes crucial to establish boundaries that protect our personal information from unwarranted intrusion. Online privacy is not an abstract ideal but a tangible shield that fortifies our individuality in the virtual realm.
James William Steven Parker